CN106302468B - Data stream protection method and device - Google Patents

Data stream protection method and device Download PDF

Info

Publication number
CN106302468B
CN106302468B CN201610682183.9A CN201610682183A CN106302468B CN 106302468 B CN106302468 B CN 106302468B CN 201610682183 A CN201610682183 A CN 201610682183A CN 106302468 B CN106302468 B CN 106302468B
Authority
CN
China
Prior art keywords
rule
key
security policy
rules
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610682183.9A
Other languages
Chinese (zh)
Other versions
CN106302468A (en
Inventor
郑黎明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
New H3C Information Technologies Co Ltd
Original Assignee
Hangzhou H3C Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou H3C Technologies Co Ltd filed Critical Hangzhou H3C Technologies Co Ltd
Priority to CN201610682183.9A priority Critical patent/CN106302468B/en
Publication of CN106302468A publication Critical patent/CN106302468A/en
Application granted granted Critical
Publication of CN106302468B publication Critical patent/CN106302468B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0485Networking architectures for enhanced packet encryption processing, e.g. offloading of IPsec packet processing or efficient security association look-up
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Selective Calling Equipment (AREA)

Abstract

The embodiment of the invention discloses a data stream protection method and a device, wherein management equipment receives a security policy acquisition message sent by member equipment, wherein the security policy acquisition message carries a group identifier of a group in which the member equipment is located; sending a security policy corresponding to the group identifier to the member device, wherein the security policy comprises a plurality of rules; and after receiving a confirmation message sent by the member equipment when the verification security policy passes, sending a key message to the member equipment, wherein the key message carries a plurality of keys and a rule corresponding to each key. It follows that the management device generates a plurality of different keys for the same group. Even if the illegal user acquires the key corresponding to one data stream protected by the group, and the keys corresponding to other data streams protected by the group are different from the acquired key, the illegal user cannot acquire the other data streams protected by the group, so that the safety of the system is improved.

Description

Data stream protection method and device
Technical Field
The present invention relates to the field of communications technologies, and in particular, to a method and an apparatus for protecting a data stream.
Background
GD VPN (Group Domain Virtual Private Network) is a Network that enables centralized management of security policies and keys. The GD VPN provides a new group-based ipsec (ip security) security model. A group is a collection of security policies, all members belonging to the same group sharing the same keys and security policies.
As shown in fig. 1, the GD VPN system includes a KS (Key Server) and a GM (Group Member). The KS generates a security policy (including information of each data stream allowed to be forwarded, an encryption algorithm, an authentication algorithm, an encapsulation mode and the like) and a key corresponding to each group respectively.
In the above scheme, the keys corresponding to the same group are the same, and all data streams protected by the group are protected by applying the same key. That is, once an illegal user acquires the key of any data stream protected by the group, other data streams protected by the group can be acquired, and the security is low.
Disclosure of Invention
The embodiment of the invention aims to provide a data stream protection method and a data stream protection device, which are used for improving the safety of a system.
In order to achieve the above object, an embodiment of the present invention discloses a data stream protection method, which is applied to a management device in a group domain virtual private network GD VPN system, and the method includes:
receiving a security policy acquisition message sent by member equipment, wherein the security policy acquisition message carries a group identifier of a group in which the member equipment is located;
sending a security policy corresponding to the group identifier to the member device, wherein the security policy comprises a plurality of rules;
after receiving a confirmation message sent by the member device when the member device verifies that the security policy passes, sending a key message to the member device, where the key message carries a plurality of keys and a rule corresponding to each key in the plurality of keys, where the rule corresponding to each key is one or more rules in the security policy, and each rule corresponds to one key, so that the member device protects a data stream matching the rule in the security policy by using the plurality of keys.
In order to achieve the above object, an embodiment of the present invention further discloses a data stream protection device, which is applied to a management device in a group domain virtual private network GD VPN system, and the device includes:
the system comprises a receiving module, a sending module and a receiving module, wherein the receiving module is used for receiving a security policy acquisition message sent by member equipment, and the security policy acquisition message carries a group identifier of a group in which the member equipment is located;
a first sending module, configured to send a security policy corresponding to the group identifier to the member device, where the security policy includes multiple rules;
a second sending module, configured to send, after receiving a confirmation message sent by the member device when the member device verifies that the security policy passes, a key message to the member device, where the key message carries multiple keys and a rule corresponding to each key in the multiple keys, where the rule corresponding to each key is one rule or multiple rules in the security policy, and each rule corresponds to one key, so that the member device protects a data stream matching the rule in the security policy by using the multiple keys.
With the embodiment of the present invention, a management device (i.e., KS) generates a plurality of different keys for the same group. Even if the illegal user acquires the key corresponding to one data stream protected by the group, and the keys corresponding to other data streams protected by the group are different from the acquired key, the illegal user cannot acquire the other data streams protected by the group, so that the safety of the system is improved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 is a schematic structural diagram of a GD VPN system according to an embodiment of the present invention
Fig. 2 is a schematic flowchart of a data stream protection method according to an embodiment of the present invention;
fig. 3 is a schematic structural diagram of a data stream protection device according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In order to solve the above technical problem, embodiments of the present invention provide a data stream protection method and apparatus. The method and apparatus are applied to a management device in a GD VPN system, which may include a management device (i.e., KS) and a member device (i.e., GM) as shown in fig. 1. First, a data stream protection method provided by an embodiment of the present invention is described in detail below.
Fig. 2 is a schematic flow chart of a data stream protection method according to an embodiment of the present invention, including:
s201: and receiving a security policy acquisition message sent by the member equipment, wherein the security policy acquisition message carries the group identifier of the group in which the member equipment is located.
In the GD VPN system, before each member device forwards the data stream, the member device and the management device can perform identity verification first; after the identity authentication is passed, the member device sends a security policy acquisition message to the management device, wherein the security policy acquisition message carries the group identifier of the group in which the member device is located.
S202: and sending a security policy corresponding to the group identifier to the member equipment, wherein the security policy comprises a plurality of rules.
In this embodiment, the management device may generate a security policy for each group, where the security policy may include an Access Control List (ACL), an authentication algorithm, a package mode, and the like. The ACL in the security policy may be configured with a plurality of rules, each rule corresponding to at least one data flow.
For example, assume that the group in which the member device is located is group a. The management device may configure 5 rules in the ACL generated for the group a, where rule 1 corresponds to data flow 1, rule 2 corresponds to data flow 2, rule 3 corresponds to data flow 3, rule 4 corresponds to data flow 4, and rule 5 corresponds to data flow 5.
The management apparatus has the same processing scheme for each group, and therefore, in this embodiment, description is made only for one group.
S203: after receiving a confirmation message sent by the member device when the member device verifies that the security policy passes, sending a key message to the member device, where the key message carries a plurality of keys and a rule corresponding to each key in the plurality of keys, where the rule corresponding to each key is one or more rules in the security policy, and each rule corresponds to one key, so that the member device protects a data stream matching the rule in the security policy by using the plurality of keys.
The member device receives the security policy sent by the management device, verifies the received security policy (for example, whether the member device can support an encryption algorithm in the security policy or not), and sends a confirmation message to the KS if the verification is passed.
And after receiving the confirmation message, the management device sends a key message to the member device. Before this, the management device generates a key corresponding to a rule in the security policy in advance.
Specifically, as an embodiment of the present invention, the management device may mark at least one rule of the plurality of rules in the security policy;
traversing the security policy and finding out the rule with the mark;
respectively generating a corresponding special key for each rule with the mark, wherein the special keys corresponding to each rule with the mark are different;
and generating a general key corresponding to the security policy, wherein the general key is a key of an unmarked rule in the plurality of rules.
In this embodiment, the rules corresponding to the data streams with higher security levels and requiring special protection may be marked, and a corresponding private key is generated for each marked rule, where each private key is different and only protects the data stream corresponding to the private key.
Assuming that the data flow 3, the data flow 4, and the data flow 5 have a high security level and require special protection, the rules 3, 4, and 5 are marked in the ACL corresponding to the group a. Specifically, the mark may be a gdoi (group Domain of interpretation) mark, but may also be other marks, which is not limited herein. And traversing the ACL in the security policy corresponding to the group A by the management equipment, and finding the rules 3, 4 and 5 with the marks. The management device generates a corresponding TEK (Traffic Encryption Key) 1 for rule 3, a corresponding TEK2 for rule 4, and a corresponding TEK3 for rule 5.
In addition, a general key may be generated to which unmarked rules in the security policy correspond.
Assume that the management device generates a common key TEK0 for the security policy corresponding to group a, where TEK0 corresponds to rule 1 and rule 2 that are not marked in the ACL of the security policy.
The key message comprises a plurality of generated keys and a rule corresponding to each key. That is, after receiving the confirmation message sent by the member device, the management device sends "rule 1 and rule 2 corresponding to TEK0 and TEK0, rule 3 corresponding to TEK1 and TEK1, rule 4 corresponding to TEK2 and TEK2, and rule 5 corresponding to TEK3 and TEK 3" to the member device, with the key message.
And the member equipment determines the key corresponding to each rule according to the received key message. When a data stream passes through the member device, the member device determines a rule matched with the data stream in the received security policy, and protects the data stream by using a key corresponding to the rule.
Specifically, after receiving the key message, the member device determines that the key corresponding to rule 1 is TEK0, the key corresponding to rule 2 is TEK0, the key corresponding to rule 3 is TEK1, the key corresponding to rule 4 is TEK2, and the key corresponding to rule 5 is TEK 3. When the data stream 1 passes through the member device, the member device determines the rule matched with the data stream 1 in the received security policy as rule 1, and then protects the data stream 1 by using the key TEK0 corresponding to the rule 1. Similarly, the member device protects data stream 2 with key TEK0 corresponding to rule 2, protects data stream 3 with TEK1 corresponding to rule 3, protects data stream 4 with TEK2 corresponding to rule 4, and protects data stream 5 with TEK3 corresponding to rule 5.
With the present embodiment, the management device generates a plurality of different keys for the same group. Even if the illegal user acquires the key corresponding to one data stream protected by the group, and the keys corresponding to other data streams protected by the group are different from the acquired key, the illegal user cannot acquire the other data streams protected by the group, so that the safety of the system is improved. In addition, the data flow passing through the member equipment can be respectively protected, the data flow with higher security level can be protected by using a special key, and the data flow with lower security level can be protected by using a general key, so that the security of data flow forwarding is improved; in addition, compared with a scheme of protecting each data stream by adopting a special key, unnecessary resource waste is avoided.
As another embodiment of the present invention, the management device may mark at least one rule of the plurality of rules in the security policy;
traversing the security policy and finding out the rule with the mark;
generating a corresponding private key for the rules with the same label, wherein the private keys corresponding to the rules with different labels are different;
and generating a general key corresponding to the security policy, wherein the general key is a key of an unmarked rule in the plurality of rules.
In this embodiment, the rules corresponding to the data streams with higher security levels and requiring special protection may be marked, and the rules with the same marks correspond to the same private key.
Following the above example, assuming that the data flow 3, the data flow 4, and the data flow 5 are data flows with higher security levels and requiring special protection, the rules 3, 4, and 5 are marked in the ACL corresponding to the group a. In addition, data stream 3 and data stream 4 have an association and can be protected by the same key. In this case, rule 3 and rule 4 may be labeled the same.
And traversing the ACL in the security policy corresponding to the group A by the management equipment, searching the rules 3, 4 and 5 with the marks, and searching that the marks corresponding to the rule 3 and the rule 4 are the same. The management device generates a corresponding TEK10 for rule 3 and rule 4 and a corresponding TEK20 for rule 5.
In addition, a general key may be generated to which unmarked rules in the security policy correspond.
Assume that the management device generates a common key TEK00 for the security policy corresponding to group a, where TEK00 corresponds to rule 1 and rule 2 that are not marked in the ACL of the security policy.
The key message sent by the management device to the member device includes the generated plurality of keys and the rule corresponding to each key. That is, after receiving the confirmation message sent by the member device, the management device sends "rule 1 and rule 2 corresponding to TEK00 and TEK00," rule 3 and rule 4 corresponding to TEK10 and TEK10, "and" rule 5 corresponding to TEK20 and TEK20 "to the member device, with the key message.
And the member equipment determines the key corresponding to each rule according to the received key message. When a data stream passes through the member device, the member device determines a rule matched with the data stream in the received security policy, and protects the data stream by using a key corresponding to the rule.
Specifically, after receiving the key message, the member device determines that the key corresponding to rule 1 is TEK00, the key corresponding to rule 2 is TEK00, the key corresponding to rule 3 is TEK10, the key corresponding to rule 4 is TEK10, and the key corresponding to rule 5 is TEK 20. When the data stream 1 passes through the member device, the member device determines the rule matched with the data stream 1 in the received security policy as rule 1, and then protects the data stream 1 by using the key TEK00 corresponding to the rule 1. Similarly, the member device protects data stream 2 with TEK00 corresponding to rule 2, protects data stream 3 with TEK10 corresponding to rule 3, protects data stream 4 with TEK10 corresponding to rule 4, and protects data stream 5 with TEK20 corresponding to rule 5.
With the present embodiment, the management device generates a plurality of different keys for the same group. Even if the illegal user acquires the key corresponding to one data stream protected by the group, and the keys corresponding to other data streams protected by the group are different from the acquired key, the illegal user cannot acquire the other data streams protected by the group, so that the safety of the system is improved. In addition, the data flow passing through the member equipment can be respectively protected, the data flow with higher security level can be protected by using a special key, and the data flow with lower security level can be protected by using a general key, so that the security of data flow forwarding is improved; in addition, compared with a scheme of protecting each data stream by adopting a special key, unnecessary resource waste is avoided.
As another embodiment of the present invention, the management device may generate a corresponding private key for each rule in the security policy, where the private key corresponding to each rule is different.
In this embodiment, a corresponding private key may be generated for each data stream protected by the set. That is, the key for each data stream is different.
In the above example, a corresponding TEK100 is generated for rule 1, a corresponding TEK200 is generated for rule 2, a corresponding TEK300 is generated for rule 3, a corresponding TEK400 is generated for rule 4, and a corresponding TEK500 is generated for rule 5.
The key message sent by the management device to the member device includes the generated plurality of keys and the rule corresponding to each key. That is, after receiving the confirmation message sent by the member device, the management device carries "rule 1 corresponding to TEK100 and TEK100, rule 2 corresponding to TEK200 and TEK200, rule 3 corresponding to TEK300 and TEK300, rule 4 corresponding to TEK400 and TEK400, and rule 5 corresponding to TEK500 and TEK 500" in the key message and sends the key message to the member device.
And the member equipment determines the key corresponding to each rule according to the received key message. When a data stream passes through the member device, the member device determines a rule matched with the data stream in the received security policy, and protects the data stream by using a key corresponding to the rule.
Specifically, after receiving the key message, the member device determines that the key corresponding to rule 1 is TEK100, the key corresponding to rule 2 is TEK200, the key corresponding to rule 3 is TEK300, the key corresponding to rule 4 is TEK400, and the key corresponding to rule 5 is TEK 500. When the data stream 1 passes through the member device, the member device determines that the rule matched with the data stream 1 in the received security policy is rule 1, and then protects the data stream 1 by using the key TEK100 corresponding to the rule 1. Similarly, the member device protects data stream 2 with the TEK200 corresponding to rule 2, protects data stream 3 with the TEK300 corresponding to rule 3, protects data stream 4 with the TEK400 corresponding to rule 4, and protects data stream 5 with the TEK500 corresponding to rule 5.
With the present embodiment, the management device generates a plurality of different keys for the same group. Even if the illegal user acquires the key corresponding to one data stream protected by the group, and the keys corresponding to other data streams protected by the group are different from the acquired key, the illegal user cannot acquire the other data streams protected by the group, so that the safety of the system is improved.
Corresponding to the above method embodiment, the embodiment of the present invention further provides a data stream protection device.
Fig. 3 is a schematic structural diagram of a data stream protection device applied to a management device according to an embodiment of the present invention, including:
a receiving module 301, configured to receive a security policy acquisition message sent by a member device, where the security policy acquisition message carries a group identifier of a group in which the member device is located;
a first sending module 302, configured to send a security policy corresponding to the group identifier to the member device, where the security policy includes multiple rules;
a second sending module 303, configured to send, after receiving a confirmation message sent by the member device when the member device verifies that the security policy passes, a key message to the member device, where the key message carries multiple keys and a rule corresponding to each key in the multiple keys, where the rule corresponding to each key is one rule or multiple rules in the security policy, and each rule corresponds to one key, so that the member device protects a data stream matching the rule in the security policy by using the multiple keys.
As an embodiment, the apparatus may further include: a marking module, a traversing module, a first generating module, and a second generating module (not shown in the figure), wherein,
a marking module for marking at least one rule of the plurality of rules in the security policy;
the traversing module is used for traversing the security policy and finding out the rule with the mark;
the first generation module is used for respectively generating a corresponding private key for each rule with a mark, wherein the private keys corresponding to each rule with the mark are different;
and a second generating module, configured to generate a general key corresponding to the security policy, where the general key is a key of an unmarked rule of the multiple rules.
As another embodiment, the apparatus may further include: a marking module, a traversing module, a third generating module, and a second generating module (not shown in the figure), wherein,
a marking module for marking at least one rule of the plurality of rules in the security policy;
the traversing module is used for traversing the security policy and finding out the rule with the mark;
the third generation module is used for generating a corresponding private key for the rules with the same marks, wherein the private keys corresponding to the rules with different marks are different;
and a second generating module, configured to generate a general key corresponding to the security policy, where the general key is a key of an unmarked rule of the multiple rules.
As another embodiment, the apparatus may further include: a marking module, a traversing module, a fourth generating module, and a second generating module (not shown in the figure), wherein,
a marking module for marking at least one rule of the plurality of rules in the security policy;
the traversing module is used for traversing the security policy and finding out the rule with the mark;
a fourth generating module, configured to generate a corresponding private key for each rule in the security policy, where the private keys corresponding to each rule are different;
and a second generating module, configured to generate a general key corresponding to the security policy, where the general key is a key of an unmarked rule of the multiple rules.
With the embodiment of the present invention shown in fig. 3, the managing device (i.e., KS) generates a plurality of different keys for the same group. Even if the illegal user acquires the key corresponding to one data stream protected by the group, and the keys corresponding to other data streams protected by the group are different from the acquired key, the illegal user cannot acquire the other data streams protected by the group, so that the safety of the system is improved.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
All the embodiments in the present specification are described in a related manner, and the same and similar parts among the embodiments may be referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, as for the apparatus embodiment, since it is substantially similar to the method embodiment, the description is relatively simple, and for the relevant points, reference may be made to the partial description of the method embodiment.
Those skilled in the art will appreciate that all or part of the steps in the above method embodiments may be implemented by a program to instruct relevant hardware to perform the steps, and the program may be stored in a computer-readable storage medium, which is referred to herein as a storage medium, such as: ROM/RAM, magnetic disk, optical disk, etc.
The above description is only for the preferred embodiment of the present invention, and is not intended to limit the scope of the present invention. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention shall fall within the protection scope of the present invention.

Claims (8)

1. A data stream protection method applied to a management device in a group domain virtual private network GD VPN system, the method comprising:
receiving a security policy acquisition message sent by member equipment, wherein the security policy acquisition message carries a group identifier of a group in which the member equipment is located;
sending a security policy corresponding to the group identifier to the member device, wherein the security policy comprises a plurality of rules;
after receiving a confirmation message sent by the member device when the member device verifies that the security policy passes, sending a key message to the member device, where the key message carries a plurality of keys and a rule corresponding to each key in the plurality of keys, where the rule corresponding to each key is one or more rules in the security policy, and each rule corresponds to one key, so that the member device protects a data stream matching the rule in the security policy by using the plurality of keys.
2. The method of claim 1, wherein prior to said sending the key message to the member device, the method further comprises:
marking at least one rule of the plurality of rules in the security policy;
traversing the security policy and finding out the rule with the mark;
respectively generating a corresponding special key for each rule with the mark, wherein the special keys corresponding to each rule with the mark are different;
and generating a general key corresponding to the security policy, wherein the general key is a key of an unmarked rule in the plurality of rules.
3. The method of claim 1, wherein prior to said sending the key message to the member device, the method further comprises:
marking at least one rule of the plurality of rules in the security policy;
traversing the security policy and finding out the rule with the mark;
generating a corresponding private key for the rules with the same label, wherein the private keys corresponding to the rules with different labels are different;
and generating a general key corresponding to the security policy, wherein the general key is a key of an unmarked rule in the plurality of rules.
4. The method of claim 1, wherein prior to said sending the key message to the member device, the method further comprises:
and respectively generating a corresponding private key for each rule in the security policy, wherein the private keys corresponding to each rule are different.
5. A data flow protection apparatus applied to a management device in a group domain virtual private network GD VPN system, the apparatus comprising:
the system comprises a receiving module, a sending module and a receiving module, wherein the receiving module is used for receiving a security policy acquisition message sent by member equipment, and the security policy acquisition message carries a group identifier of a group in which the member equipment is located;
a first sending module, configured to send a security policy corresponding to the group identifier to the member device, where the security policy includes multiple rules;
a second sending module, configured to send, after receiving a confirmation message sent by the member device when the member device verifies that the security policy passes, a key message to the member device, where the key message carries multiple keys and a rule corresponding to each key in the multiple keys, where the rule corresponding to each key is one rule or multiple rules in the security policy, and each rule corresponds to one key, so that the member device protects a data stream matching the rule in the security policy by using the multiple keys.
6. The apparatus of claim 5, further comprising:
a marking module for marking at least one rule of the plurality of rules in the security policy;
the traversing module is used for traversing the security policy and finding out the rule with the mark;
the first generation module is used for respectively generating a corresponding private key for each rule with a mark, wherein the private keys corresponding to each rule with the mark are different;
and a second generating module, configured to generate a general key corresponding to the security policy, where the general key is a key of an unmarked rule of the multiple rules.
7. The apparatus of claim 5, further comprising:
a marking module for marking at least one rule of the plurality of rules in the security policy;
the traversing module is used for traversing the security policy and finding out the rule with the mark;
the third generation module is used for generating a corresponding private key for the rules with the same marks, wherein the private keys corresponding to the rules with different marks are different;
and a second generating module, configured to generate a general key corresponding to the security policy, where the general key is a key of an unmarked rule of the multiple rules.
8. The apparatus of claim 5, further comprising:
a marking module for marking at least one rule of the plurality of rules in the security policy;
the traversing module is used for traversing the security policy and finding out the rule with the mark;
a fourth generating module, configured to generate a corresponding private key for each rule in the security policy, where the private keys corresponding to each rule are different;
and a second generating module, configured to generate a general key corresponding to the security policy, where the general key is a key of an unmarked rule of the multiple rules.
CN201610682183.9A 2016-08-17 2016-08-17 Data stream protection method and device Active CN106302468B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610682183.9A CN106302468B (en) 2016-08-17 2016-08-17 Data stream protection method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610682183.9A CN106302468B (en) 2016-08-17 2016-08-17 Data stream protection method and device

Publications (2)

Publication Number Publication Date
CN106302468A CN106302468A (en) 2017-01-04
CN106302468B true CN106302468B (en) 2020-11-20

Family

ID=57679654

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610682183.9A Active CN106302468B (en) 2016-08-17 2016-08-17 Data stream protection method and device

Country Status (1)

Country Link
CN (1) CN106302468B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1379938A (en) * 1999-10-18 2002-11-13 耶德托存取公司 Method for distributing keys among number of secure devices, method for communicating with number of secure devices, security system, and set of secure devices
US7055027B1 (en) * 1999-03-22 2006-05-30 Microsoft Corporation System and method for trusted inspection of a data stream
CN101188851A (en) * 2006-11-17 2008-05-28 中兴通讯股份有限公司 Access control method for mobile terminal
CN103546420A (en) * 2012-07-09 2014-01-29 杭州华三通信技术有限公司 Method for registering Group Members (GMs) to Key Server (KS) in Group Encrypted Transport Virtual Private Network (GET VPN) and GMs and KS
CN104038335A (en) * 2014-06-05 2014-09-10 杭州华三通信技术有限公司 GD VPN (Group Domain Virtual Private Network) upgrading method and device
CN104270350A (en) * 2014-09-19 2015-01-07 杭州华三通信技术有限公司 Key information transmission method and equipment
CN105592076A (en) * 2015-12-07 2016-05-18 杭州华三通信技术有限公司 GD VPN registration method and device

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7055027B1 (en) * 1999-03-22 2006-05-30 Microsoft Corporation System and method for trusted inspection of a data stream
CN1379938A (en) * 1999-10-18 2002-11-13 耶德托存取公司 Method for distributing keys among number of secure devices, method for communicating with number of secure devices, security system, and set of secure devices
CN101188851A (en) * 2006-11-17 2008-05-28 中兴通讯股份有限公司 Access control method for mobile terminal
CN103546420A (en) * 2012-07-09 2014-01-29 杭州华三通信技术有限公司 Method for registering Group Members (GMs) to Key Server (KS) in Group Encrypted Transport Virtual Private Network (GET VPN) and GMs and KS
CN104038335A (en) * 2014-06-05 2014-09-10 杭州华三通信技术有限公司 GD VPN (Group Domain Virtual Private Network) upgrading method and device
CN104270350A (en) * 2014-09-19 2015-01-07 杭州华三通信技术有限公司 Key information transmission method and equipment
CN105592076A (en) * 2015-12-07 2016-05-18 杭州华三通信技术有限公司 GD VPN registration method and device

Also Published As

Publication number Publication date
CN106302468A (en) 2017-01-04

Similar Documents

Publication Publication Date Title
CN104519020B (en) Manage method, server and the system of wireless network login password sharing function
CN1823514B (en) Method and apparatus for providing network security using role-based access control
CN109729080B (en) Access attack protection method and system based on block chain domain name system
JP2020516202A (en) Core network access provider
CN106487763B (en) Data access method based on cloud computing platform and user terminal
KR20150141362A (en) Network node and method for operating the network node
US20100205452A1 (en) System, method and program product for communicating a privacy policy associated with a biometric reference template
CN103268456B (en) Method and device for file safety control
RU2573212C2 (en) Method of accessing services, systems and devices based on wlan access authentication
WO2017097101A1 (en) Method and apparatus for account number login
US20230059173A1 (en) Password concatenation for secure command execution in a secure network device
CN105025019A (en) Data safety sharing method
CN110071813A (en) A kind of account permission change method system, account platform and user terminal
CN111193755B (en) Data access method, data encryption method and data encryption and access system
CN105049546B (en) A kind of Dynamic Host Configuration Protocol server is the method and device of client distribution IP address
CN104486364A (en) Access control method based on electronic certificate
Hamdane et al. A credential and encryption based access control solution for named data networking
CN108234126B (en) System and method for remote account opening
US10902139B2 (en) Method to track the dissemination of a data set
CN106302468B (en) Data stream protection method and device
CN106992978A (en) Network safety managing method and server
Karthick et al. Formalization and analysis of a resource allocation security protocol for secure service migration
KR102055888B1 (en) Encryption and decryption method for protecting information
CN110582986A (en) Security authentication method for generating security key by combining authentication factors of multiple users
CN106101058A (en) A kind of hot information processing method based on Quick Response Code

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
CB02 Change of applicant information

Address after: 310052 Binjiang District Changhe Road, Zhejiang, China, No. 466, No.

Applicant after: NEW H3C TECHNOLOGIES Co.,Ltd.

Address before: 310053 Hangzhou science and Technology Industrial Park, high tech Industrial Development Zone, Zhejiang Province, No. six and road, No. 310

Applicant before: HANGZHOU H3C TECHNOLOGIES Co.,Ltd.

CB02 Change of applicant information
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20230619

Address after: 310052 11th Floor, 466 Changhe Road, Binjiang District, Hangzhou City, Zhejiang Province

Patentee after: H3C INFORMATION TECHNOLOGY Co.,Ltd.

Address before: No. 466 Changhe Road, Binjiang District

Patentee before: NEW H3C TECHNOLOGIES Co.,Ltd.

TR01 Transfer of patent right